The Nigerian cyber threat landscape is very interesting. It is almost a free for all environment where seasoned cyber criminals shamelessly advertise their services and capabilities to upcoming fraudsters. The army of bad guys, otherwise known as the “Gee Boys”, is growing at a rate that the good guys can only dream of, yet organizations

Are you truly defending your enterprise or simply distracted? In today’s cyber threat landscape, an effective e-mail security capability is big deal. According to Verizon’s 2018 Data Breach Investigations Report (DBIR), 98% of all incidents and 93% of all breaches analyzed during its last reporting period involved phishing and pretexting (i.e. creation of a false

A hacker by the moniker “Mr.OneJack” has added Nigeria’s National Assembly’s (NASS) website (nass[.]gov[.]ng) to his inventory of hacked sites. This does not look like a targeted attack given that there are similarities with several other websites already pwned by this threat actor. That said though, who knows whether any backend database was hacked as

CarePartners didn’t seem to care about paying any ransom to a hacking group that stole their patients’ sensitive records 2 months ago, but now a malicious individual has decided to put the breached records up for sale on the underground market. On June 18, 2018, CarePartners – an Ontario-based home care service provider – publicly

How do you identify disgruntled employees? At what point do you start monitoring their activities closely? Do your employees have expectation of privacy or does your policy make it clear that all employees’ activities may be monitored? The recent devastating insider attack at Tesla is a stark reminder of the fact that, as much as

I am not one to beat a horse when it’s already dead but, at the same time, I find it hard to resist the temptation of using this possibly overstated security breach to reinforce the importance of putting your security house in order. Your business needs you and the reverse is true. Don’t wait to

What do you call what’s worse than (a) BEAST? The biggest cyber security news for 2018 has surfaced and so much has been said about the Meltdown and Spectre vulnerabilities already. The most complete non-technical article I’ve read about this yet is available here Like the BEAST (SSL) vulnerability, these flaws have widespread applicability and

Computer security is difficult (maybe even impossible), but imagine for a moment that we’ve achieved it. Strong cryptography where required; secure protocols are doing whatever needs to be done. The hardware is secure; the software is secure. Even the network is secure. It’s a miracle. Unfortunately, this isn’t enough. For this miraculous computer system to

“Old age is like a plane flying through a storm. Once you’re aboard there’s nothing you can do.” – Golda Meir Let’s set the context to begin with: the “cloud” is your infrastructure and data in someone else’s data center. Most components of this infrastructure have IP addresses and so are hackable. Worse still, your data

Mind the gap. If you’ve ever travelled on the London underground, you will be familiar with the line: “Please mind the gap between the train and the platform. Mind the gap”. This audible phrase reminds (or warns) passengers to be mindful of the spatial gap between the station platform and the train door. The first